Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to use Tor to create an anonymous website in Linux

2025-04-05 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/01 Report--

This article is about how to use Tor to create an anonymous website in Linux. I think it is very practical, so I share it with you. I hope you can get something after reading this article.

Introduction: TOR-the-onion-router

Create an anonymous server using Tor's .onion domain name

Tor can not only provide anonymous access to the client, Tor can also provide anonymous access to the server. By using the Tor network, users can maintain servers whose location is unknown. Of course, if you want to access this covert service, the client also has to install Tor.

Its hidden services can be accessed through the top-level domain (Top Level Domain,TLD) .onion specified by Tor. Tor networks can recognize their own TLD and automatically route to hidden services. The hidden service then passes the request to standard server software, which should be pre-configured to listen for only non-public interfaces. If the service is also accessible through the public Internet, it will also be attacked by related parties, so that it is not really hidden.

We can use the .onion top-level domain specified by tor to hide our services. The following is about how to create a. Onion website.

Note: this is a serious matter. To ensure complete anonymity, you must configure your web server to be secure enough not to disclose any information. And make sure there are no wrong web pages or other possibilities for revealing your true IP and other identity information. Be safe (well, didn't you say that nsa is monitoring tor?)

Of course, if you don't care much about anonymity, at least make sure your web server has good security, because although Tor is a good thing, websites built with Tor may be frequently attacked by script boys (those who can only use tools developed by others to attack, a disdainful term for them by powerful hackers)

The prerequisite for using this tutorial is that you have a web server, which can be apache,nginx or something.

This tutorial is conducted in the following environments:

A web server with nginx installed

The web server port is 8080

System version Debian Wheezy

Step 1: install nginx (not really, just use an installation package of someone else's brother Jun's lnmp)

The code is as follows:

Sudo apt-get install nginx

Step 2: configure nginx to listen on port 8080

The code is as follows:

Sudo vi / etc/nginx/sites-available/default / / Editing the nginx configuration file with vi

Change the number after listen to 8080 in the server section, as follows:

The code is as follows:

Server {

Listen 127.0.0.1:8080

...

Then restart nginx:

The code is as follows:

Sudo service nginx restart

Then try to use curl to access http://localhost:8080 on the local machine, usually installed. Put it on your own if you didn't pack it. If you can access it, the nginx setting is complete.

Add configuration instructions for apache and lighthttpd:

Apache:

The code is as follows:

Listen 127.0.0.1:8080

Lighthttpd:

The code is as follows:

Listen 127.0.0.1:8080

Server.bind = "127.0.0.1"

Remember that they have to restart after changing the configuration.

Step 3: install Tor

Official address for other versions of the tutorial: https://www.torproject.org/docs/debian.html.en

The methods are as follows:

First modify the configuration file of the source of debian, and then you can install tor directly by apt-get, saving time and effort.

The code is as follows:

Sudo vi / etc/apt/sources.list / / Edit the configuration file of the source with vi

Add the following line:

The code is as follows:

Deb http://deb.torproject.org/torproject.org main

Then add the key file signature, using the following two lines of command:

The code is as follows:

Sudo gpg-keyserver keys.gnupg.net-recv 886DDD89

Sudo gpg-- export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add-

Tor officially provides a debian software package to help us keep the update of the signed key synchronized at all times. Install it with the following command:

The code is as follows:

Sudo apt-get install deb.torproject.org-keyring

Once configured, you can install Tor directly with the following command

The code is as follows:

Sudo apt-get install tor

The default dns name is deb.torproject.org. If you can't connect, try the following three:

The code is as follows:

Deb-master.torproject.org

Mirror.netcologne.de

Tor.mirror.youam.de

(if you are not familiar with the configuration of the debian source, please consult the relevant documentation.)

Step 4: modify the configuration file of Tor

Assuming that you have installed Tor, enter the relevant configuration below

The code is as follows:

Vi / etc/tor/torrc

Add the following two lines:

The code is as follows:

HiddenServiceDir / var/lib/tor/hidden_service/

HiddenServicePort 80 127.0.0.1:8080

Then save the file and start tor

The code is as follows:

Sudo service tor start

When tor starts, a private key is created in your hidden_service directory, along with your unique. Onion hostname.

Here is what these files look like. Of course, you should not let anyone see your private key, the following is only for display purposes:

The code is as follows:

Root@starbuck:~# cd / var/lib/tor/hidden_service/

Root@starbuck:/var/lib/tor/hidden_service# ls

Hostname private_key

Root@starbuck:/var/lib/tor/hidden_service# cat private_key

-BEGIN RSA PRIVATE KEY-

MIICXAIBAAKBgQC9ymfMgQk12AFT4PXWV+XfmZ1tVDaGajya/jIuwnwtjFdMWe7m

VDWMjs8Z02GGJhH6tIIpoDUrWLi+YchNHlQBi2AnBFzAoSlfRcvobeBAaWuQn+aH

Uzr+xVXOADSIcfgtT5Yd13RKmUEKFV8AO9u652zYP1ss0l+S2mY/J/t/3wIDAQAB

AoGAMjQwcPBRN2UENOP1I9XsgNFpy1nTcor3rShArg3UO1g8X34Kq/Lql1vPfM1l

Ps67Qs4tAEXYyraVaAcFrSCwp6MyeKYwxZtT7ki7q3rbMycvbYquxquh0uGy4aed

K8XWjPrUv3yzQSYslOehVWMTH7xTzaOvp5uhpAlHFRqN5MECQQDmpFkXmtfEGwqT

BRbKegRs9siNY6McWBCGrYc/BrpXEiK0j2QcrjC/dMJ4P9O4A94aG4NSI/005fII

VxrOmD9VAkEA0qhBVWeZD7amfvPYChQo0B4ACZZdJlcUd/x1JSOYbVKvRCvJLxjT

5LMwg93jj2m386jXWx8n40Zcus6BTDr6YwJBAKH8E0ZszdVBWLAqEbOq9qjAuiHz

NH+XqiOshCxTwVOdvRorCxjJjhspGdvyl/PJY5facuShuhgI13AlJ+KpMvECQHDJ

L1lzw1bPc2uLgUM8MfHj7h8z+6G4hAQODmaZHVaDK8XzL59gyqqrajFgTyOM9emm

N89w6flcxe9a+41mEoMCQBaM91yvrfp7N9BeDMCHlSDfAzX7sDqQn44ftHvZZI9V

4IouuRuLlqN0iaw4V73v3MUeqXoasmdeZ89bVGhVrC8 =

-END RSA PRIVATE KEY-

Root@starbuck:/var/lib/tor/hidden_service# cat hostname

Juyy62wplbkk7gzy.onion

Root@starbuck:/var/lib/tor/hidden_service#

Step 5: use the browser to access the domain name of .onion to see if it is successful

The above is how to use Tor to create anonymous websites in Linux. The editor believes that there are some knowledge points that we may see or use in our daily work. I hope you can learn more from this article. For more details, please follow the industry information channel.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report